Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-18423

EPSS 5.19% · P90
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-18423

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service via a XENMEM_add_to_physmap hypercall. p2m->max_mapped_gfn is used by the functions p2m_resolve_translation_fault() and p2m_get_entry() to sanity check guest physical frame. The rest of the code in the two functions will assume that there is a valid root table and check that with BUG_ON(). The function p2m_get_root_pointer() will ignore the unused top bits of a guest physical frame. This means that the function p2m_set_entry() will alias the frame. However, p2m->max_mapped_gfn will be updated using the original frame. It would be possible to set p2m->max_mapped_gfn high enough to cover a frame that would lead p2m_get_root_pointer() to return NULL in p2m_get_entry() and p2m_resolve_translation_fault(). Additionally, the sanity check on p2m->max_mapped_gfn is off-by-one allowing "highest mapped + 1" to be considered valid. However, p2m_get_root_pointer() will return NULL. The problem could be triggered with a specially crafted hypercall XENMEM_add_to_physmap{, _batch} followed by an access to an address (via hypercall or direct access) that passes the sanity check but cause p2m_get_root_pointer() to return NULL. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen version 4.8 and newer are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Xen 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Xen是英国剑桥大学的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。 Xen 4.12.x及之前版本中存在安全漏洞。攻击者可利用该漏洞造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-18423

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-18423

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-10-31 · 54 CVEs total

CVE-2019-515110.0 CRITICALYouPHPTube SQL注入漏洞
CVE-2019-51508.9 HIGHYouPHPTube SQL注入漏洞
CVE-2019-18369JetBrains YouTrack 安全漏洞
CVE-2019-18420Xen 格式化字符串错误漏洞
CVE-2019-18360JetBrains Hub 信息泄露漏洞
CVE-2019-18422Xen 安全漏洞
CVE-2019-18424Xen 操作系统命令注入漏洞
CVE-2019-18425Xen 安全漏洞
CVE-2019-18421Xen 竞争条件问题漏洞
CVE-2019-18367JetBrains TeamCity 安全漏洞
CVE-2010-2490Mumble 输入验证错误漏洞
CVE-2019-18368JetBrains Toolbox 安全漏洞
CVE-2019-18366JetBrains TeamCity 安全漏洞
CVE-2009-5043burn 安全漏洞
CVE-2009-5041OVERKILL Software overkill 缓冲区错误漏洞
CVE-2009-5042python-docutils 安全漏洞
CVE-2019-12612Bitdefender BOX 输入验证错误漏洞
CVE-2019-16251WordPress YIT Plugin Framework 安全漏洞
CVE-2019-18465Progress Software MOVEit Transfer 访问控制错误漏洞
CVE-2019-18464Progress Software MOVEit Transfer SQL注入漏洞

Showing top 20 of 54 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-18423

No comments yet


Leave a comment